Debian Package Tracker
Register | Log in
Subscribe

libmatio

Choose email to subscribe with

general
  • source: libmatio (main)
  • version: 1.5.30-2
  • maintainer: Debian Science Maintainers (archive) (DMD)
  • uploaders: Sébastien Villemot [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.5.19-2
  • o-o-sec: 1.5.19-2+deb11u1
  • oldstable: 1.5.23-2
  • stable: 1.5.28-2
  • testing: 1.5.30-2
  • unstable: 1.5.30-2
versioned links
  • 1.5.19-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.19-2+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.23-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.28-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.29-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.5.30-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libmatio-dev
  • libmatio-doc
  • libmatio14
  • matio-tools
action needed
lintian reports 4 warnings normal
Lintian reports 4 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-01-24 Last update: 2026-01-24 11:31
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2025-2338: (needs triaging) A vulnerability, which was classified as critical, was found in tbeu matio 1.5.28. Affected is the function strdup_vprintf of the file src/io.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-50343: (needs triaging) An issue was discovered in matio 1.5.28. A heap-based memory corruption can occur in Mat_VarCreateStruct() when the nfields value does not match the actual number of strings in the fields array. This leads to out-of-bounds reads and invalid memory frees during cleanup, potentially causing a segmentation fault or heap corruption.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-08-09 Last update: 2026-01-29 14:30
3 low-priority security issues in bookworm low

There are 3 open security issues in bookworm.

3 issues left for the package maintainer to handle:
  • CVE-2025-2337: (postponed; to be fixed through a stable update) A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-2338: (needs triaging) A vulnerability, which was classified as critical, was found in tbeu matio 1.5.28. Affected is the function strdup_vprintf of the file src/io.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-50343: (needs triaging) An issue was discovered in matio 1.5.28. A heap-based memory corruption can occur in Mat_VarCreateStruct() when the nfields value does not match the actual number of strings in the fields array. This leads to out-of-bounds reads and invalid memory frees during cleanup, potentially causing a segmentation fault or heap corruption.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-03-17 Last update: 2026-01-29 14:30
news
[rss feed]
  • [2026-01-29] Accepted libmatio 1.5.19-2+deb11u1 (source) into oldoldstable-security (Andreas Henriksson)
  • [2026-01-29] libmatio 1.5.30-2 MIGRATED to testing (Debian testing watch)
  • [2026-01-23] Accepted libmatio 1.5.30-2 (source) into unstable (Sébastien Villemot)
  • [2026-01-17] Accepted libmatio 1.5.30-1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Sébastien Villemot)
  • [2025-11-20] libmatio 1.5.29-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-14] Accepted libmatio 1.5.29-1 (source) into unstable (Sébastien Villemot)
  • [2025-05-09] libmatio 1.5.28-2 MIGRATED to testing (Debian testing watch)
  • [2025-04-29] Accepted libmatio 1.5.28-2 (source) into unstable (Sébastien Villemot)
  • [2024-11-10] libmatio 1.5.28-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-04] Accepted libmatio 1.5.28-1 (source) into unstable (Sébastien Villemot)
  • [2024-06-05] libmatio 1.5.27-2 MIGRATED to testing (Debian testing watch)
  • [2024-05-31] Accepted libmatio 1.5.27-2 (source) into unstable (Sébastien Villemot)
  • [2024-04-26] Accepted libmatio 1.5.27-1 (source amd64 all) into experimental (Debian FTP Masters) (signed by: Sébastien Villemot)
  • [2023-11-20] libmatio 1.5.26-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-15] Accepted libmatio 1.5.26-1 (source) into unstable (Sébastien Villemot)
  • [2023-11-05] libmatio 1.5.24-1 MIGRATED to testing (Debian testing watch)
  • [2023-11-05] libmatio 1.5.24-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-30] Accepted libmatio 1.5.24-1 (source) into unstable (Sébastien Villemot)
  • [2022-06-06] libmatio 1.5.23-2 MIGRATED to testing (Debian testing watch)
  • [2022-06-01] Accepted libmatio 1.5.23-2 (source) into unstable (Sébastien Villemot)
  • [2022-04-16] libmatio 1.5.23-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-16] libmatio 1.5.23-1 MIGRATED to testing (Debian testing watch)
  • [2022-04-11] Accepted libmatio 1.5.23-1 (source) into unstable (Sébastien Villemot)
  • [2022-04-03] libmatio 1.5.22-1 MIGRATED to testing (Debian testing watch)
  • [2022-03-29] Accepted libmatio 1.5.22-1 (source) into unstable (Sébastien Villemot)
  • [2021-08-28] libmatio 1.5.21-1 MIGRATED to testing (Debian testing watch)
  • [2021-08-22] Accepted libmatio 1.5.21-1 (source) into unstable (Sébastien Villemot)
  • [2020-11-25] libmatio 1.5.19-2 MIGRATED to testing (Debian testing watch)
  • [2020-11-25] libmatio 1.5.19-2 MIGRATED to testing (Debian testing watch)
  • [2020-11-19] Accepted libmatio 1.5.19-2 (source) into unstable (Sébastien Villemot)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 4)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.5.30-2
  • 4 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing